INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Mobile Devices / Consumer Electronics HIGH 4h Global ransomware Multiple sectors CRITICAL 4h Global malware Networking / Infrastructure CRITICAL 5h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 6h Global supply_chain Software Development and DevOps CRITICAL 7h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors HIGH 10h Global general Digital Content & Intellectual Property MEDIUM 10h Global malware Technology and Software Development CRITICAL 10h Global ddos Technology and Social Media HIGH 11h Global vulnerability Mobile Devices / Consumer Electronics HIGH 4h Global ransomware Multiple sectors CRITICAL 4h Global malware Networking / Infrastructure CRITICAL 5h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 6h Global supply_chain Software Development and DevOps CRITICAL 7h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors HIGH 10h Global general Digital Content & Intellectual Property MEDIUM 10h Global malware Technology and Software Development CRITICAL 10h Global ddos Technology and Social Media HIGH 11h Global vulnerability Mobile Devices / Consumer Electronics HIGH 4h Global ransomware Multiple sectors CRITICAL 4h Global malware Networking / Infrastructure CRITICAL 5h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 6h Global supply_chain Software Development and DevOps CRITICAL 7h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors HIGH 10h Global general Digital Content & Intellectual Property MEDIUM 10h Global malware Technology and Software Development CRITICAL 10h Global ddos Technology and Social Media HIGH 11h
Vulnerabilities

CVE-2026-2876

High
A vulnerability was determined in Tenda A18 15.13.07.13. This affects the function parse_macfilter_rule of the file /goform/setBlackRule. This manipulation of the argument deviceList causes stack-base
CWE-119 — Weakness Type
Published: Feb 21, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.8
🔗 NVD Official
📄 Description (English)

A vulnerability was determined in Tenda A18 15.13.07.13. This affects the function parse_macfilter_rule of the file /goform/setBlackRule. This manipulation of the argument deviceList causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.

🤖 AI Executive Summary

A critical stack-based buffer overflow vulnerability exists in Tenda A18 router firmware (version 15.13.07.13) affecting the parse_macfilter_rule function. Remote attackers can exploit this via the deviceList parameter in /goform/setBlackRule to execute arbitrary code or cause denial of service. With CVSS 8.8 and public disclosure, this poses immediate risk to Saudi organizations relying on Tenda networking equipment.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 22, 2026 22:56
🇸🇦 Saudi Arabia Impact Assessment
High impact on Saudi telecommunications sector (STC, Mobily, Zain) and enterprise networks using Tenda A18 routers for branch connectivity. Government agencies (NCA, CITC) managing network infrastructure face critical risk. Banking sector (SAMA-regulated institutions) using these devices for network segmentation or branch offices at risk of compromise. Healthcare facilities and educational institutions with Tenda equipment vulnerable to remote code execution. SMEs across Saudi Arabia heavily reliant on budget-friendly Tenda routers face significant exposure.
🏢 Affected Saudi Sectors
Telecommunications (STC, Mobily, Zain) Banking and Financial Services (SAMA-regulated) Government and Public Administration (NCA, CITC) Healthcare Education Small and Medium Enterprises (SMEs) Retail and E-commerce
⚖️ Saudi Risk Score (AI)
8.6
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all Tenda A18 devices running firmware 15.13.07.13 in your network using network scanning tools
2. Isolate affected devices from critical network segments if patching cannot be completed immediately
3. Restrict access to /goform/setBlackRule endpoint via firewall rules (block port 80/443 to router management interface from untrusted networks)
4. Change default router credentials and disable remote management features

PATCHING:
5. Download latest firmware from Tenda official website (verify firmware version > 15.13.07.13)
6. Apply firmware update through router web interface or management console
7. Verify successful update by checking firmware version in device settings

COMPENSATING CONTROLS (if patch unavailable temporarily):
8. Implement network segmentation - place Tenda A18 in isolated VLAN
9. Deploy IDS/IPS rules to detect buffer overflow attempts to /goform/setBlackRule
10. Monitor router logs for suspicious deviceList parameter values (unusually long strings)
11. Disable MAC filtering feature if not required

DETECTION RULES:
- Alert on HTTP POST requests to /goform/setBlackRule with deviceList parameter > 256 bytes
- Monitor for repeated failed authentication attempts to router management interface
- Track firmware version compliance across all Tenda devices in inventory
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع أجهزة Tenda A18 التي تعمل بالإصدار 15.13.07.13 في شبكتك باستخدام أدوات فحص الشبكة
2. عزل الأجهزة المتأثرة عن قطاعات الشبكة الحرجة إذا لم يكن يمكن إكمال التصحيح فوراً
3. تقييد الوصول إلى نقطة نهاية /goform/setBlackRule عبر قواعد جدار الحماية (حظر المنافذ 80/443 لواجهة إدارة جهاز التوجيه من الشبكات غير الموثوقة)
4. تغيير بيانات اعتماد جهاز التوجيه الافتراضية وتعطيل ميزات الإدارة البعيدة

التصحيح:
5. تحميل أحدث إصدار من البرنامج الثابت من موقع Tenda الرسمي (التحقق من إصدار البرنامج الثابت > 15.13.07.13)
6. تطبيق تحديث البرنامج الثابت عبر واجهة الويب لجهاز التوجيه أو وحدة التحكم في الإدارة
7. التحقق من نجاح التحديث بفحص إصدار البرنامج الثابت في إعدادات الجهاز

الضوابط البديلة (إذا لم يكن التصحيح متاحاً مؤقتاً):
8. تنفيذ تقسيم الشبكة - ضع Tenda A18 في VLAN معزول
9. نشر قواعد IDS/IPS للكشف عن محاولات تجاوز المخزن المؤقت إلى /goform/setBlackRule
10. مراقبة سجلات جهاز التوجيه لقيم معامل deviceList المريبة (السلاسل الطويلة بشكل غير عادي)
11. تعطيل ميزة تصفية MAC إذا لم تكن مطلوبة

قواعد الكشف:
- تنبيه على طلبات HTTP POST إلى /goform/setBlackRule مع معامل deviceList > 256 بايت
- مراقبة محاولات المصادقة الفاشلة المتكررة لواجهة إدارة جهاز التوجيه
- تتبع توافق إصدار البرنامج الثابت عبر جميع أجهزة Tenda في المخزون
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.12.6.1 - Management of technical vulnerabilities ECC 2024 A.14.2.1 - Secure development policy ECC 2024 A.12.2.1 - Monitoring and logging of network access
🔵 SAMA CSF
ID.RA-1 - Asset management and vulnerability identification PR.IP-12 - Security patch management DE.CM-1 - Network monitoring and anomaly detection
🟡 ISO 27001:2022
A.12.6.1 - Management of technical vulnerabilities A.14.2.1 - Secure development and change management A.12.2.1 - Monitoring and logging
🟣 PCI DSS v4.0
Requirement 6.2 - Security patches and updates Requirement 11.2 - Vulnerability scanning
📦 Affected Products / CPE 1 entries
tenda:a18_firmware:15.13.07.13
📊 CVSS Score
8.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.8
CWECWE-119
Exploit No
Patch ✓ Yes
Published 2026-02-21
Source Feed nvd
Views 2
🇸🇦 Saudi Risk Score
8.6
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
CWE-119
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.